Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp3695162imu; Mon, 28 Jan 2019 09:11:14 -0800 (PST) X-Google-Smtp-Source: ALg8bN6dCDpf3yuP3h5DPZFl1iH1YCFYD9HhVUtJ6vVeawPQAVw3yxwTNdrqPYVpVa6sCD+/r6eo X-Received: by 2002:a17:902:3f81:: with SMTP id a1mr22288234pld.258.1548695474130; Mon, 28 Jan 2019 09:11:14 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1548695474; cv=none; d=google.com; s=arc-20160816; b=P86TmVIp2iKXLq81GzNZE1/quhwi5CAos7YqQwQ8/mgmzWs61LC3RbqvEyCPFOECzz b0RIqFYcoL4jpAA3qeH9YFqOsNQkuVMZOST2prO51nagBikl6E+dSMMRuVdH6pj6Wk6r O4UVm9/cOWFvefXwJHhOqA8eqpo3Gs+um0FIHQHDU2sGplcJCjtQgZsHezBkUVqjrI9j RB+S+BpcGrCKl9qxJebf8WdQ0/odyxgQEAzPJK8hqZxMptRNqoJ5xKRG9Gi6DGUj+TAF O750F95NRzrz8W0qG9mCBImSh+50IhcvDAYkYev9aMhkUub2wknRAXVfEUPIKr8ROVXu TSLA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=OuGP1JTtnwkkSv3BjnvFYhJPVfS9fQ+XweUzPqWRraU=; b=N/9zphkYCuRoMbqYgMWvimYkeFldlw5tVVCSpER1c9P/9b2ObqlWy2rv10i6lfMhax ENMeh88kONR3U2aeP1ab33xhRcUvbD18u8khMW05b9e+fUybjJv0z3KaERjlI9eyB9LI fscoF2XZ3O/5OgeIvcljFBHQfFix7a6fAuSO2611RGN4NTzU4nznFws0aNEA0EQIRYje syxzHlyda4NcpemCchPcM2En9mRhRCgIHxY4nYZUdGakrc15Ty4m70i50T7PYqSIU2Li hjvNgdg0CDb1iKVZ10TN1esNNUlTROGo/MZ+yaIbqLvMs8oN1UsuYplGrmqBWDd91Rpx z2rw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=TJMHPPY+; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id d13si24519513pgh.196.2019.01.28.09.10.58; Mon, 28 Jan 2019 09:11:14 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=TJMHPPY+; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728747AbfA1RKx (ORCPT + 99 others); Mon, 28 Jan 2019 12:10:53 -0500 Received: from mail.kernel.org ([198.145.29.99]:35548 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1732713AbfA1QKE (ORCPT ); Mon, 28 Jan 2019 11:10:04 -0500 Received: from sasha-vm.mshome.net (c-73-47-72-35.hsd1.nh.comcast.net [73.47.72.35]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id A71E32147A; Mon, 28 Jan 2019 16:10:02 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1548691803; bh=vwyx7JbQxCLjaBAxrpCUsJgYcw/gILGrPJiiEeZeyJA=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=TJMHPPY+yDKpsRtEyTCazbuUwEFjpQ3ma6ibVEykDWh1ZadciKZx6lh4EIUawS7pf MPl9bpAr6WS9bk5D8M6goIFirKGPo0wRf58BeELfKYb8JfEcclmcfm8CbS2wR1IIzk NeGs87AeS0TFBBlwPfZJ0KyjA0KFgnpV6ie4z9sY= From: Sasha Levin To: linux-kernel@vger.kernel.org, stable@vger.kernel.org Cc: Michael Ellerman , Steven Rostedt , Sasha Levin Subject: [PATCH AUTOSEL 4.19 222/258] seq_buf: Make seq_buf_puts() null-terminate the buffer Date: Mon, 28 Jan 2019 10:58:48 -0500 Message-Id: <20190128155924.51521-222-sashal@kernel.org> X-Mailer: git-send-email 2.19.1 In-Reply-To: <20190128155924.51521-1-sashal@kernel.org> References: <20190128155924.51521-1-sashal@kernel.org> MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 X-Patchwork-Hint: Ignore Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Michael Ellerman [ Upstream commit 0464ed24380905d640030d368cd84a4e4d1e15e2 ] Currently seq_buf_puts() will happily create a non null-terminated string for you in the buffer. This is particularly dangerous if the buffer is on the stack. For example: char buf[8]; char secret = "secret"; struct seq_buf s; seq_buf_init(&s, buf, sizeof(buf)); seq_buf_puts(&s, "foo"); printk("Message is %s\n", buf); Can result in: Message is fooªªªªªsecret We could require all users to memset() their buffer to zero before use. But that seems likely to be forgotten and lead to bugs. Instead we can change seq_buf_puts() to always leave the buffer in a null-terminated state. The only downside is that this makes the buffer 1 character smaller for seq_buf_puts(), but that seems like a good trade off. Link: http://lkml.kernel.org/r/20181019042109.8064-1-mpe@ellerman.id.au Acked-by: Kees Cook Signed-off-by: Michael Ellerman Signed-off-by: Steven Rostedt (VMware) Signed-off-by: Sasha Levin --- lib/seq_buf.c | 6 +++++- 1 file changed, 5 insertions(+), 1 deletion(-) diff --git a/lib/seq_buf.c b/lib/seq_buf.c index 11f2ae0f9099..6aabb609dd87 100644 --- a/lib/seq_buf.c +++ b/lib/seq_buf.c @@ -144,9 +144,13 @@ int seq_buf_puts(struct seq_buf *s, const char *str) WARN_ON(s->size == 0); + /* Add 1 to len for the trailing null byte which must be there */ + len += 1; + if (seq_buf_can_fit(s, len)) { memcpy(s->buffer + s->len, str, len); - s->len += len; + /* Don't count the trailing null byte against the capacity */ + s->len += len - 1; return 0; } seq_buf_set_overflow(s); -- 2.19.1